Re: [Idr] draft-uttaro-idr-bgp-persistence-00

"UTTARO, JAMES" <> Thu, 27 October 2011 20:17 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id 01E7D21F8B19 for <>; Thu, 27 Oct 2011 13:17:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -105.549
X-Spam-Status: No, score=-105.549 tagged_above=-999 required=5 tests=[AWL=0.450, BAYES_00=-2.599, J_CHICKENPOX_13=0.6, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id pLQyIeA+QnRo for <>; Thu, 27 Oct 2011 13:17:40 -0700 (PDT)
Received: from ( []) by (Postfix) with ESMTP id 863F321F8B16 for <>; Thu, 27 Oct 2011 13:17:37 -0700 (PDT)
X-Originating-IP: []
X-StarScan-Version: 6.3.6; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 24324 invoked from network); 27 Oct 2011 20:17:36 -0000
Received: from (HELO ( by with DHE-RSA-AES256-SHA encrypted SMTP; 27 Oct 2011 20:17:36 -0000
Received: from (localhost.localdomain []) by (8.14.4/8.14.4) with ESMTP id p9RKI36M027843; Thu, 27 Oct 2011 16:18:03 -0400
Received: from ( []) by (8.14.4/8.14.4) with ESMTP id p9RKHqGC027675 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Thu, 27 Oct 2011 16:17:52 -0400
Received: from ([]) by ([]) with mapi id 14.01.0339.001; Thu, 27 Oct 2011 16:17:24 -0400
From: "UTTARO, JAMES" <>
To: "'Enke Chen'" <>
Thread-Topic: [Idr] draft-uttaro-idr-bgp-persistence-00
Thread-Index: AQHMkEAnLP0iAkRlVkChUYWtkZqOMZWKuQoAgAQhplCAAIdcwoABIPrw
Date: Thu, 27 Oct 2011 20:17:23 +0000
Message-ID: <>
References: <> <> <> <> <>
In-Reply-To: <>
Accept-Language: en-US
Content-Language: en-US
x-originating-ip: []
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: " List" <>, "" <>
Subject: Re: [Idr] draft-uttaro-idr-bgp-persistence-00
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Inter-Domain Routing <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Thu, 27 Oct 2011 20:17:44 -0000


GR is a solution that is essentially local in scope it does not have the ability to inform downstream speakers of the viability of routing state from the point of possible control plane failure. OTOH Persistence does propagate the condition of state. This provides distinct advantages in terms of customers awareness of the SPs control plane. One could imagine a customer receiving a STALE path and responding by selecting a backup. Some of the extensions to this draft that I have considered in colouring of STALE to inform if the condition arises from a local ( PE ) or internal iBGP ( RR ) failures.. 

GR makes no distinction from STALE state and ACTIVE state.. This can lead to the STALE path still being preferred throughout the topology. IMO this is incorrect behavior regardless of the comparison. 

PERSISTENCE allows for a customer to indicate which paths should be candidates. Customers may want to immediately failover to the backup for some paths and not for others. GR is not capable of doing this it is all or nothing. The granularity is not sufficient. It needs to be at the path level. There may even be a case for having even more granularity i.e a per path timer.. GR is not capable of being extended for either of these cases.

GR does not provide protection through successive restarts of the session. I believe that if this occurs the state will be invalidated. So for a session that is bouncing due to overload condition GR will not provide the required protection

GR does not employ a make before break strategy. All state is invalidated first then the newly learned state is processed. This leads to routing churn especially if the majority of the state is the same which I am pretty sure is the case

GR invalidates state due to the case of protocol error i.e A malformed update will invalidate all of the state. This is not the desired behavior.

GR is not specific as to which events invoke it or not. From my read on the draft it is not clear if holdtime expiration invokes GR or not.. The draft is unclear.

It is not clear to me how RRs and PEs differ in using GR. 

The time that state can persist is limit to about 1 hour max. 

GR does detail the behavior where convergence is not achieved between restarts.. Similar to above..  

I do not believe that the current GR paradigm can be extended to cover the majority of the cases above.

	Jim Uttaro

-----Original Message-----
From: Enke Chen [] 
Sent: Wednesday, October 26, 2011 8:43 PM
Cc:; List; Enke Chen
Subject: Re: [Idr] draft-uttaro-idr-bgp-persistence-00

Hi, folks:

I have a hard time in understanding what new problems (beyond the GR) 
the draft try to solve :-(

If the concern is about the simultaneous RR failure as shown in the 
examples in Sect. 6 Application, that can be addressed easily using GR.  
As the RRs are not in the forwarding path, it means that the forwarding 
is not impacted (thus is preserved) during the restart of a RR.   The 
Forwarding State bit (F) in the GR capability should always be set by 
the RR when it is not in the forwarding path.

Also in the case of simultaneous RR failure, I do not see why one would 
want to retain some routes, but not others, using the communities 
specified in the draft.  As the RRs are not in the forwarding path, 
wouldn't be better to retain all the routes on a PE/client?

As you might be aware, efforts have been underway to address issues with 
GR found during implementation and deployment. They include the spec 
respin, notification handling, and implementations.  If there are issues 
in the GR area that are not adequately addressed,  I suggest that we try 
to address them in the GR respin if possible, instead of creating 
another variation unnecessarily.

Thanks.   -- Enke

On 10/26/11 10:24 AM, Robert Raszuk wrote:
> Jim,
> When one during design phase of a routing protocol or routing protocol 
> extension or modification to it already realizes that enabling such 
> feature may cause real network issue if not done carefully - that 
> should trigger the alarm to rethink the solution and explore 
> alternative approaches to the problem space.
> We as operators have already hard time to relate enabling a feature 
> within our intradomain boundaries to make sure such rollout is network 
> wide. Here you are asking for the same level of awareness across ebgp 
> boundaries. This is practically unrealistic IMHO.
> Back to the proposal ... I think that if anything needs to be done is 
> to employ per prefix GR with longer and locally configurable timer. 
> That would address information persistence across direct IBGP sessions.
> On the RRs use case of this draft we may perhaps agree to disagree, 
> but I do not see large enough probability of correctly engineered RR 
> plane to experience simultaneous multiple ibgp session drops. If that 
> happens the RR placement, platforms or deployment model should be 
> re-engineered.
> Summary .. I do not think that IDR WG should adopt this document. Just 
> adding a warning to the deployment section is not sufficient.
> Best regards,
> R.
>> Robert,
>> The introduction of this technology needs to be carefully evaluated
>> when being deployed into the network. Your example clearly calls out
>> how a series of independent design can culminate in incorrect
>> behavior. Certainly the deployment of persistence on a router that
>> has interaction with a router that does not needs to be clearly
>> understood by the network designer. The goal of this draft is to
>> provide a fairly sophisticated tool that will protect the majority of
>> customers in the event of a catastrophic failure.. The premise being
>> the perfect is not the enemy of the good.. I will add text in the
>> deployment considerations section to better articulate that..
>> Thanks, Jim Uttaro
>> -----Original Message----- From:
>> [] On Behalf Of Robert Raszuk Sent:
>> Sunday, October 23, 2011 5:32 PM To: List Subject: [Idr]
>> draft-uttaro-idr-bgp-persistence-00
>> Authors,
>> Actually when discussing this draft a new concern surfaced which I
>> would like to get your answer on.
>> The draft in section 4.2 says as one of the forwarding rules:
>> o  Forwarding to a "stale" route is only used if there are no other
>> paths available to that route.  In other words an active path always
>> wins regardless of path selection.  "Stale" state is always
>> considered to be less preferred when compared with an active path.
>> In the light of the above rule let's consider a very simple case of
>> dual PE attached site of L3VPN service. Two CEs would inject into
>> their IBGP mesh routes to the remote destination: one marked as STALE
>> and  one not marked at all. (Each CE is connected to different PE and
>> each PE RT imports only a single route to a remote hub headquarter to
>> support geographic load balancing).
>> Let me illustrate:
>> VPN Customer HUB
>> PE3      PE4 SP PE1      PE2 |        | |        | CE1      CE2 |
>> | 1|        |10 |        | R1 ------ R2 1
>> CE1,CE2,R1,R2 are in IBGP mesh. IGP metric of CE1-R1 and R1-R2 are 1
>> and R2-CE2 is 10.
>> Prefix X is advertised by remote hub in the given VPN such that PE1
>> vrf towards CE1 only has X via PE3 and PE2's vrf towards CE2 only has
>> X via PE4.
>> Let's assume EBGP sessions PE3 to HUB went down, but ethernet link
>> is up, next hop is in the RIB while data plane is gone. Assume no
>> data plane real validation too. /* That is why in my former message
>> I suggested that data plane validation would be necessary */.
>> R1 has X via PE1/S (stale) and X via PE2/A (active) - it understands
>> STALE so selects in his forwarding table path via CE2.
>> R2 has X via PE1/S (stale) and X via PE2/A (active) - it does not
>> understand STALE, never was upgraded to support the forwarding rule
>> stated above in the draft and chooses X via CE1 (NH metric 2 vs 10).
>> R1--R2 produce data plane loop as long as STALE paths are present in
>> the system. Quite fun to troubleshoot too as the issue of PE3
>> injecting such STALE paths may be on the opposite site of the world.
>> The issue occurs when some routers within the customer site will be
>> able to recognize STALE transitive community and prefer non stale
>> paths in their forwarding planes (or BGP planes for that matter)
>> while others will not as well as when both stale and non stale paths
>> will be present.
>> Question 1: How do you prevent forwarding loop in such case ?
>> Question 2: How do you prevent forwarding loop in the case when
>> customer would have backup connectivity to his sites or connectivity
>> via different VPN provider yet routers in his site only partially
>> understand the STALE community and only partially follow the
>> forwarding rules ?
>> In general as the rule is about mandating some particular order of
>> path forwarding selection what is the mechanism in distributed
>> systems like today's routing to be able to achieve any assurance that
>> such rule is active and enforced across _all_ routers behind EBGP
>> PE-CE L3VPN boundaries in customer sites ?
>> Best regards, R.
>> -------- Original Message -------- Subject: [Idr]
>> draft-uttaro-idr-bgp-persistence-00 Date: Sat, 22 Oct 2011 00:23:55
>> +0200 From: Robert Raszuk<> Reply-To:
>> To: List<>
>> Hi,
>> I have read the draft and have one question and one observation.
>> Question:
>> What is the point of defining DO_NOT_PERSIST community ? In other
>> words why not having PERSIST community set would not mean the same as
>> having path marked with DO_NOT_PERSIST.
>> Observation:
>> I found the below statement in section 4.2:
>> o  Forwarding must ensure that the Next Hop to a "stale" route is
>> viable.
>> Of course I agree. But since we stating obvious in the forwarding
>> section I think it would be good to explicitly also state this in
>> the best path selection that next hop to STALE best path must be
>> valid.
>> However sessions especially those between loopbacks do not go down
>> for no reason. Most likely there is network problem which may have
>> caused those sessions to go down. It is therefor likely that LDP
>> session went also down between any of the LSRs in the data path and
>> that in spite of having the paths in BGP and next hops in IGP the LSP
>> required for both quoted L2/L3VPN applications is broken. That may
>> particularly happen when network chooses to use independent control
>> mode for label allocation.
>> I would suggest to at least add the recommendation statement to the
>> document that during best path selection especially for stale paths
>> a validity of required forwarding paradigm to next hop of stale
>> paths should be verified.
>> For example using techniques as described in:
>> draft-ietf-idr-bgp-bestpath-selection-criteria
>> Best regards, R.
>> _______________________________________________ Idr mailing list
>> _______________________________________________ Idr mailing list
> _______________________________________________
> Idr mailing list